메뉴 건너뛰기




Volumn 3348, Issue , 2004, Pages 136-147

Information theory and the security of binary data perturbation

Author keywords

[No Author keywords available]

Indexed keywords

DATA MINING; DATA PRIVACY; ENTROPY; CRYPTOGRAPHY; INFORMATION THEORY;

EID: 35048843809     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30556-9_12     Document Type: Article
Times cited : (3)

References (16)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • December
    • Nabil R. Adam and John G. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, Vol. 21, No. 4, pp. 515-556, December 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Worthmann, J.G.2
  • 4
    • 84961369151 scopus 로고
    • Security of ramp schemes
    • Lecture Notes on Comput. Sci., Springer Verlag
    • G. R. Blakley and C. Meadows. Security of ramp schemes. Proc. of Crypto'84, Lecture Notes on Comput. Sci., 196, pp. 242-268, Springer Verlag, 1984.
    • (1984) Proc. of Crypto'84 , vol.196 , pp. 242-268
    • Blakley, G.R.1    Meadows, C.2
  • 6
    • 12244265258 scopus 로고    scopus 로고
    • The inference problem: A survey
    • December
    • Csilla Farkas and Sushil Jajodia. The inference problem: a survey. ACM SIGKDD Explorations Newsletter Volume 4, Issue 2, pp. 6-11, December 2003.
    • (2003) ACM SIGKDD Explorations Newsletter , vol.4 , Issue.2 , pp. 6-11
    • Farkas, C.1    Jajodia, S.2
  • 8
    • 0000964471 scopus 로고
    • Measures of Disclosure Risk and Harm
    • Diane Lambert. Measures of Disclosure Risk and Harm. Journal of Official Statistics, 9, pp. 313-331, 1993.
    • (1993) Journal of Official Statistics , vol.9 , pp. 313-331
    • Lambert, D.1
  • 9
    • 33746437508 scopus 로고    scopus 로고
    • Privacy Preserving Data Mining
    • Y. Lindell and B. Pinkas. Privacy Preserving Data Mining. Journal of Cryptology, 15 (3), 177-206, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 11
    • 0004168557 scopus 로고
    • Cambridge University Press, New York, NY
    • Rajeev Motwani and Prabhakar Raghavan. Randomized Algorithms, pp. 67-73, Cambridge University Press, New York, NY, 1995.
    • (1995) Randomized Algorithms , pp. 67-73
    • Motwani, R.1    Raghavan, P.2
  • 12
    • 0346396080 scopus 로고    scopus 로고
    • Security of random data perturbation methods
    • Dec.
    • Krishnamurty Muralidhar and Rathindra Sarathy. Security of random data perturbation methods. ACM Transactions on Database Systems (TODS) vol. 24, no. 4, Dec. 1999, pp. 487 - 493
    • (1999) ACM Transactions on Database Systems (TODS) , vol.24 , Issue.4 , pp. 487-493
    • Muralidhar, K.1    Sarathy, R.2
  • 14
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • July
    • Claude Shannon. A mathematical theory of communication. Bell Systems Technical Journal, vol. 27, pp. 379-423, July 1948.
    • (1948) Bell Systems Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.1
  • 15
    • 0030283874 scopus 로고    scopus 로고
    • Linear-time encodable and decodable error-correcting codes
    • Daniel A. Spielman. Linear-time encodable and decodable error-correcting codes. IEEE Transactions on Information Theory, Vol 42, No 6, pp. 1723-1732, 1996.
    • (1996) IEEE Transactions on Information Theory , vol.42 , Issue.6 , pp. 1723-1732
    • Spielman, D.A.1
  • 16
    • 0141904495 scopus 로고    scopus 로고
    • The channel coding theorem and the security of binary randomization
    • Yokohama, Japan, June 30 - July 4
    • Poorvi Vora. The channel coding theorem and the security of binary randomization. Proc., 2003 IEEE International Symposium of Information Theory, Yokohama, Japan, June 30 - July 4, pp. 306, 2003.
    • (2003) Proc., 2003 IEEE International Symposium of Information Theory , pp. 306
    • Vora, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.